Datamation Logo
Home
Authors
Posts by Drew Robb
Drew Robb

Drew Robb

Top Mobile Identity Management (MIM) Trends 

Top Mobile Identity Management (MIM) Trends 

Applications
April 26, 2022

Mobile identities are more than just a necessary part of the login process. They facilitate trusted communication and interaction with people and things. Mobile identity management (MIM) provides the identity management and security features that are generally the province of enterprise systems geared toward laptops and PCs.  Here are some of the top trends in […]

5 Top Mobile Device Management (MDM) Trends 

5 Top Mobile Device Management (MDM) Trends 

Applications
April 26, 2022

Mobile Device management (MDM) is a process and technology that provides the mobile workforce with productivity tools and applications as well as security. MDM provisions mobile devices while protecting assets and data. It manages device inventory and provisioning, taking a device-centric approach in contrast to mobile security and unified endpoint management (UEM), which prefer a […]

5 Top Trends in Enterprise Mobility Management (EMM) 

5 Top Trends in Enterprise Mobility Management (EMM) 

Applications
April 26, 2022

Enterprise mobility management (EMM) is all about how users, applications, content management and data security are combined. EMM simplifies device management, configuration, enrollment, distribution of apps and documents, and facilitates collaboration. Here are some of the top trends in EMM market:  1. Cybercrime Surge  Work-from-home (WFH) fundamentally changed enterprise mobility management (EMM). Companies found it difficult […]

5 Top Endpoint Protection Trends

5 Top Endpoint Protection Trends

Applications
April 26, 2022

The endpoint security has been an area of volatility for some time. Back in the day, antivirus solved the problem. You just performed regular scans for viruses and that was all you needed to be concerned about. But things quickly changed as attack vectors grew in sophistication. And now the list of endpoint threat categories […]

5 Top Private 5G Trends

5 Top Private 5G Trends

Big Data
April 14, 2022

The business world is salivating over the potential of 5G: ultra-reliable and low-latency connectivity within a secure network, which has particular allure for mission-critical applications, such as public safety, transportation fleets, manufacturing, oil and gas, mining, and energy.  These organizations are creating high demand for private 5G networks as they see it as a way […]

5 Top Enterprise 5G Trends

5 Top Enterprise 5G Trends

Big Data
April 14, 2022

5G wireless services and smartphones are being marketed relentlessly. The service offers more bandwidth and a broader feature set that will facilitate improved streaming and a host of other benefits. For companies in particular, enterprise 5G holds huge potential.  Here are some of the top trends in the enterprise 5G market:  See more: The Enterprise […]

5 Top Intrusion Prevention System (IPS) Trends

5 Top Intrusion Prevention System (IPS) Trends

Applications
April 4, 2022

Intrusion prevention systems (IPSs) have been with us for some time. Over the decades, the technology has evolved. A big distinction was once made about IPS versus intrusion detection systems (IDSs). These days, both tend to be included within the same product.  IPS, then, relates to software or hardware that offers network security by preventing […]

5 Top Firewall Trends 

5 Top Firewall Trends 

Applications
April 4, 2022

Firewalls have been an enterprise battleground for many years. Every organization needed them, so it was only natural that vendors would compete over market dominance in the large category.  That has given rise to constant change and innovation on the firewall front and a healthy dose of marketing hype. After the firewall market became saturated, […]

Top VPN Trends

Top VPN Trends

Applications
March 25, 2022

Virtual private networks (VPNs) get a bad rap these days. There are always vendors or articles explaining how they are dated and no longer fit for purpose in the third decade of the new millennium. And yet they persist. VPNs continue to be used by organizations across the world to provide remote workers with secure […]

Top CASB and CWPP Trends 

Top CASB and CWPP Trends 

Applications
March 25, 2022

Cloud access security broker (CASB) applications really started to gather steam in the early 2010s. They were designed to provide cloud and software-as-a-service (SaaS) applications with the security controls and protections organizations were used to with internally run information systems. They needed the same level of auditing, access control, data governance, threat detection and prevention […]

Page 7 of 44
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Advertisers

Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.

Advertise with Us

Our Brands


Privacy Policy Terms & Conditions About Contact Advertise California - Do Not Sell My Information

Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.